CVE-2004-1013

UNKNOWN
10.0CVSS
Published: 2005-01-10
Updated: 2025-04-03
AI Analysis

Description

The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.

CVSS Metrics

Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
Access Vector
network
Access Cmplx
low
Auth
none
Confidentiality
complete
Integrity
complete
Availability
complete
Weaknesses
NVD-CWE-Other

Metadata

Primary Vendor
CARNEGIE_MELLON_UNIVERSITY
Published
1/10/2005
Last Modified
4/3/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

carnegie_mellon_university : cyrus_imap_servercarnegie_mellon_university : cyrus_imap_servercarnegie_mellon_university : cyrus_imap_servercarnegie_mellon_university : cyrus_imap_servercarnegie_mellon_university : cyrus_imap_servercarnegie_mellon_university : cyrus_imap_servercarnegie_mellon_university : cyrus_imap_servercarnegie_mellon_university : cyrus_imap_servercarnegie_mellon_university : cyrus_imap_servercarnegie_mellon_university : cyrus_imap_servercarnegie_mellon_university : cyrus_imap_servercarnegie_mellon_university : cyrus_imap_servercarnegie_mellon_university : cyrus_imap_serveropenpkg : openpkgconectiva : linuxconectiva : linuxredhat : fedora_coreredhat : fedora_coretrustix : secure_linuxtrustix : secure_linuxtrustix : secure_linuxubuntu : ubuntu_linuxubuntu : ubuntu_linux

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2004-1013 | UNKNOWN Severity | CVEDatabase.com | CVEDatabase.com